UNIVERSITI PUTRA MALAYSIA

Similar documents
AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

QOS-AWARE HANDOVER SCHEME FOR HIERARCHICAL MOBILE IPv6 USING CONTEXT TRANSFER WITH LINK LAYER TRIGGER

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

AN ENHANCED CONNECTIVITY AWARE ROUTING PROTOCOL FOR VEHICULAR AD HOC NETWORKS AHMADU MAIDORAWA

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

Introduction to Mobile Ad hoc Networks (MANETs)

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

Performance Evaluation of MANET through NS2 Simulation

MICRO-MOBILITY ENHANCEMENT IN MULTICAST MOBILE IPv6 WIRELESS NETWORKS. By YONG CHU EU

Performance Evaluation of Various Routing Protocols in MANET

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED


TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Routing Protocols in MANETs

SUMMERY, CONCLUSIONS AND FUTURE WORK

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

UNIVERSITI PUTRA MALAYSIA WEIGHTED WINDOW FOR TCP FAIR BANDWIDTH ALLOCATION IN WIRELESS LANS

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

DEVELOPMENT OF COMMERCIAL VEHICLE SPEED WARNING SYSTEM NGO CHON CHET

Analysis of Routing Protocols in MANETs

BORANG PENGESAHAN STATUS TESIS

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

UNIVERSITI PUTRA MALAYSIA ENHANCED MOBILITY SOLUTION IN MOBILE IPV6 NETWORK

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

PERFORMANCE OF TRANSMISSION CONTROL PROTOCOL (TCP) CONGESTION CONTROL OVER WIRELESS LINKS USING MODIFIED SNOOP PROTOCOL

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF A REAL-TIME EMBEDDED REMOTE TRIGGERING AND MONITORING SYSTEM CHUI YEW LEONG FK

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

CLOUD COMPUTING ADOPTION IN BANKING SYSTEM (UTM) IN TERMS OF CUSTOMERS PERSPECTIVES SHAHLA ASADI

1100 O 9 ) f. o( 11 O O O 8 )!: 'l. '''' t ''!!K. Ragb Orner Mohamed Saleh. PUSAT PEMBELAJARAN DIGITAL SULTANAH NUR ZAHIRAH. ,.',)_ j,i...

Evaluation of Routing Protocols for Mobile Ad hoc Networks

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

Overview (Advantages and Routing Protocols) of MANET

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

Performance Analysis and Enhancement of Routing Protocol in Manet

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

ANOMALY DETECTION IN WIRELESS SENSOR NETWORK (WSN) LAU WAI FAN

A Survey - Energy Efficient Routing Protocols in MANET

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

UNIVERSITI PUTRA MALAYSIA WEB CAMERA APPLICATION FOR MOTION DETECTION KOAY SU YEONG FK

MAGNETIC FLUX LEAKAGE SYSTEM FOR WIRE ROPE INSPECTION USING BLUETOOTH COMMUNICATION MUHAMMAD MAHFUZ BIN SALEHHON UNIVERSITI TEKNOLOGI MALAYSIA

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS

Performance Evaluation of AODV and DSR routing protocols in MANET

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

UNIVERSITI PUTRA MALAYSIA A WEB-BASED CONTROL AND MONITORING SYSTEM AHMAD ABDUSALAM FIRJANI FK

STATISTICAL APPROACH FOR IMAGE RETRIEVAL KHOR SIAK WANG DOCTOR OF PHILOSOPHY UNIVERSITI PUTRA MALAYSIA

This item is protected by original copyright

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

UNIVERSITI PUTRA MALAYSIA AMTREE PROTOCOL ENHANCEMENT BY MULTICAST TREE MODIFICATION AND INCORPORATION OF MULTIPLE SOURCES ALI MOHAMMED ALI AL SHARAFI

BORANG PENGESAHAN STATUS TESIS

LINK QUALITY AWARE ROUTING ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS RIBWAR BAKHTYAR IBRAHIM UNIVERSITI TEKNOLOGI MALAYSIA

II. ROUTING CATEGORIES

DEVELOPMENT OF A MOBILE ROBOT SPATIAL DATA ACQUISITION SYSTEM OOI WEI HAN MASTER OF SCIENCE UNIVERSITI PUTRA MALAYSIA

Routing Protocols in Mobile Ad-Hoc Network

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

Ad Hoc Routing Protocols and Issues

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

RESOURCE ALLOCATION SCHEME FOR FUTURE USER-CENTRIC WIRELESS NETWORK WAHEEDA JABBAR UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA RELIABILITY PERFORMANCE EVALUATION AND INTEGRATION OF ROUTING ALGORITHM IN SHUFFLE EXCHANGE WITH MINUS ONE STAGE

IJMIE Volume 2, Issue 6 ISSN:

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

UNIVERSITI PUTRA MALAYSIA AN INTEGRATED FIREWALL SYSTEM MODEL IN A MULTICLIENT- SERVER ENVIRONMENT HUSSEIN A. TAQI AL-KAZWINI FK

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Mobile Ad-Hoc Wireless Network

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

Routing Protocols in MANET: Comparative Study

DATASET GENERATION AND NETWORK INTRUSION DETECTION BASED ON FLOW-LEVEL INFORMATION AHMED ABDALLA MOHAMEDALI ABDALLA

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

UNIVERSITI PUTRA MALAYSIA RANK-ORDER WEIGHTING OF WEB ATTRIBUTES FOR WEBSITE EVALUATION MEHRI SAEID

UNIVERSITI PUTRA MALAYSIA A MATRIX USAGE FOR LOAD BALANCING IN SHORTEST PATH ROUTING NOR MUSLIZA MUSTAFA FSKTM

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

UNIVERSITI PUTRA MALAYSIA EMBEDDED ETHERNET WEB SERVER FOR A ROBOT ARM CONTROL TOE OO ZAW FK

Transcription:

. UNIVERSITI PUTRA MALAYSIA ENHANCED AD HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK INTERNET CONNECTIVITY GOBI A/L GURUSAMY T FK 2006 102

ENHANCED AD HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK INTERNET CONNECTIVITY By GOBI A/L GURUSAMY Thesis Submitted to the School of Graduate Studies, Universiti Putra Malaysia, in Partial Fulfilment of the Requirements for the Degree of Master of Science February 2006

DEDICATION To my loving parents for their endless care and support, and who are always there for me. Thank you. ii

Abstract of thesis presented to the Senate of University Putra Malaysia in Partial fulfilment of the requirement for the degree of Master of Science ENHANCED AD HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK INTERNET CONNECTIVITY By GOBI A/L GURUSAMY February 2006 Chairman : Professor Borhanuddin Mohd. Ali, PhD Faculty : Engineering An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration and consists of mobile nodes that use a wireless interface to communicate with each other. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. Hence, the mobile nodes are able to communicate beyond their transmission range by supporting multi hop communication. However, the fact that there is no central infrastructure and that the devices which can move randomly gives rise to various kinds of problems, such as routing and security and quality of service (QoS). In this thesis the problem of routing is considered. An Ad-Hoc network has certain characteristics, which impose new demand on the routing protocol the most important characteristic is the dynamic topology, which is a consequence of node mobility. Nodes can changes position quite frequently, which means that we need a routing protocol that quickly adapts to topology changes. The nodes in ad hoc network can consist of laptops and PDA (Personal Digital Assistants) and are often very limited in resources such as CPU capacity, storage capacity, battery iii

power and bandwidth. This means that routing protocol should try to minimize control traffic, such as period update message. Instead the routing protocol should be reactive, thus only calculate routes upon receiving a specific request. The Internet Engineering Task Force (IEFT) currently has a working group called mobile Ad hoc network (MANET) that is working on routing specification for Ad hoc networks. This thesis evaluates some of the routing protocols such as AODV (Ad hoc on demand Distance vector) and DSR (Dynamic Sources Routing) and DSDV (Destination Sequenced Distance vector) for performance testing and an enhanced implementation of AODV, which is able to detect Internet gateway in the proactive, reactive, and hybrid situation. This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. However, since there is an interest in communication between not only mobile devices in an ad hoc network, but also between a mobile device in an ad hoc network and a fixed device in a fixed network (e.g. the Internet), the ad hoc routing protocols need to be modified. In this thesis the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet. For this purpose Network Simulator 2, NS 2, has been used. Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated. iv

Abstrak tesis yang dikemukakan kepada Senat Universiti Putra Malaysia sebagai memenuhi sebahagian keperluan untuk ijazah Master Sanis MENINGKATKAN VECTOR JARAK ATAS PERMINTAAN AD HOC DENGAN SALNG KAITAN INTERNET UNTUK RANGKAIAN BERGERAK AD HOC Oleh GOBI A/L GURUSAMY Februari 2006 Pengerusi : Profesor Borhanuddin Mohd Ali,PhD Fakulti : Kejuruteraan Rangkaian ad-hoc ialah himpunan nod wayarles yang bergerak secara dinamik yang dapat membentuk satu rangkaian sementara tanpa menggunakan rangkaian infrastruktur yang sedia ada atau tidak menggunakan pentadbiran pusat serta mempunyai nod pergerakan yang digunakan sebagai gelombang wayarles untuk berhubung antara satu sama lain.pergerakan nod ini berfungsi sebagai hos dan penghala supaya dapat mengemukakan paket bagi pihak satu sama lain. Justeru, nod pergerakan ini dapat berhubung melebihi had transmisi dengan sokongan berbagai-bagai hop. Namun, disebabkan tiada infrastruktur pusat serta alatan itu dapat bergerak secara rawak. Situasi ini menimbulkan pelbagai masalah seperti penghalaan, keselamatan dan perkhidmatan yang berkualiti. Dalam tesis ini, masalah penyambungan Internet protokol penghalaan diberi perhatian. Sesuatu rangkaian Ad-hoc mempunyai cirri-ciri tertentu yang menuntut permintaan baru dalam protokol penghalaan. Ciri yang terpenting ialah topologi dinamik. Hal ini tertimbul akibat pergerakan nod. Kedudukan nod boleh bertukar dengan cepat dari v

semasa ke semasa. Hal ini bermakna satu protokol penghalaan diperlukan yang boleh menyesuaikan diri dengan penubuhan topologi dengan cepat. Nod dalam rangkaian adhoc boleh terdiri daripada laptop dan PDA dan biasanya sumber- sumber seperti kemampuan CPU, kemampuan penyimpanan, kuasa bateri dari bandwith adalah terhad. Hal ini bermakna protokol penghalaan seharusnya cuba mengawal trafik secara minimum, seperti tempoh mengemaskinikan maklumat. Sesungguhnya, protokol penghalaan patut diaktifkan semula untuk membolehkan penghalaan diambil kira sebaik sahaja permintaan tertentu diterima. Pada masa ini, pasukan petugas kejuruteraan Internet IEFT mempunyai satu kumpulan kerja yang mengendalikan usaha membuat spesifikasi penghalaan untuk rangakaian adhoc. Tesis ini menilai beberapa protocol seperti AODV, DSR dan DSDV untuk menguji prestasi serta perlaksanaaan secara meluas AODV yang boleh meneroka serta mengesan get-laluan secara proaktif,pengsktifan semula dan dalam situasi hybrid penilaian dibuat secara simulasi dengan menggunakan rangkaian NS-2 diciptakan oleh universiti California Berkeley. Terdapat beberapa protokol penghalaan ad-hoc seperti AODV, DSR dan DSDN yang mencadangkan penyelesaian untuk penghalaan dalam lingkungan rangkaian pergerakan ad-hoc. Walau bagaimanapun, keperluan komunikasi adalah tidak terhad kepada peralatan bergerak sahaja tetapi juga dalam komunikasi antara peralatan bergerak dengan peralatan tetap dalam rangkaian seperti internet. Justeru, protokol pnghalaan perlu diubah suai untuk situasi tersebut. vi

Dalam tesis ini, protokol penghalaan ad-hoc seperti AODV diguna pakai serta diubah suai untuk menilai penyambungan antara rangkaian pergerakan sementara dan internet. Untuk tujuan ini, Rangkaian Simulasi 2 (NS2) digunakan. Tambahan pula, tiga pendekatan dicadangkan untuk penemuan get laluan, seperti proaktif, pengaktifan semula dan get laluan hybrid serta mengemukakan algorithm dan penentu penghala algorithm untuk penyelesaian masalah penghala dan hos dalam MANET dikaji. vii

ACKNOWLEDGEMENTS Firstly, I m grateful and thankful to THE ALL MIGHTY GOD for this entire blessing, which has enabled me to complete my thesis. We are sure that he was watching us closely throughout the thesis. I would like to take this opportunity to thank my supervisor, Prof. Dr. Borhanuddin Mohd. Ali for his patient in guiding me accomplishes this thesis. Appreciation also goes to the author's co-supervisors, Saiful Jahari for assisting in solving various difficulties that was encountered throughout the project. Apart from them, special thanks also go to lecturers especially, Dr. Ashraf Gasim Abdalla and Dr. Prakash for all their bright ideas and suggestions. Special thanks to fellow colleagues from the Broadband Group for their encouragement, fruitful discussions and willingness to listen. Lastly, the author wishes to express sincere appreciation to his parents and family for never doubting him and enabling him to be what he is today. viii

I certify that an Examination Committee has met on 6 th February 2006 to conduct the final examination of Gobi a/l Gurusamy on his Master of Science thesis entitled Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad-Hoc Network Internet Connectivity in accordance with Universiti Pertanian Malaysia (Higher Degree) Act 1980 and Universiti Pertanian Malaysia (Higher Degree) Regulations 1981. The Committee recommends that the candidate be awarded the relevant degree. Member of the Examination Committee are as follows: Khairi Yusuf, PhD Lecturer Fakulti Kejuruteraan Universiti Putra Malaysia (Chairman) Prof.Madya Dr. Abdul Rahman Ramli Professor Fakulti Kejuruteraan Universiti Putra Malaysia (Internal Examiner) Sabria Khatun, PhD Lecturer Fakulti Kejuruteraan Universiti Putra Malaysia (Internal Examiner) Dato Ir.Mashkuri Yaacob, PhD Professor Fakulti Sains Komputer dan Teknologi Maklumat Universiti Malaya (Enternal Examiner) HASANAH MOHD.GHAZALI, PhD Professor/Deputy Dean School of Graduate Studies Universiti Putra Malaysia Date : ix

This thesis submitted to the Senate of Universiti Putra Malaysia and has been accepted as partial fulfilment of the requirement for the degree of Master of Science. The members of the Supervisory Committee are as follows: Borhanuddin Mohd. Ali, PhD Professor Faculty of Engineering Universiti Putra Malaysia (Chairman) Saiful Jahari, MS Lecturer Department of Computer and Communication Engineering Faculty of Engineering Universiti Putra Malaysia (Member) AINI IDERIS, PhD Professor/Dean School of Graduate Studies Universiti Putra Malaysia Date : x

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at UPM or other institutions. GOBI A/L GURUSAMY Date: xi

TABLE OF CONTENTS Page DEDICATION ABSTRACT ABSTRAK ACKNOWLEDGEMENT APPROVAL DECLARATION LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS ii iii v vii ix xi xv xvi xix CHAPTER 1 INTRODUCTION 1 1.1 Mobile Ad hoc Networks 3 1.2 MANET Internet Engineering Task Force 4 1.3 Applications of MANETs 6 1.3.1 Military Networks 6 1.3.2 Collaborative Networks 7 1.3.3 Emergency Services 7 1.3.4 Wireless Sensor Networks 8 1.3.5 Personal Area Networks and Blue tooth 8 1.4 Motivation 9 1.5 Problem Statement 12 1.6 Objective 15 1.7 Network Performance Parameter 16 1.7.1 Quantitative metrics 16 1.7.2 Performance Metrics 16 1.8 Thesis Report Organization 17 2 LITERATURE REVIEW 19 2.1 Introduction 19 2.2 General Concepts Ad Hoc Networks 20 2.3 Wireless Ad Hoc Networks 22 2.3.1 Characteristics of Wireless Mobile Ad-Hoc Networks 24 2.4 Routing 26 2.4.1 Type of Ad-Hoc Routing Protocols 27 2.5 Ad hoc Routing Protocols 30 2.5.1 Ad-hoc on Demand Distance vector (AODV) 30 2.5.2 Dynamic Source Routing- (DSR) 39 2.5.3 Destination Sequenced Distance Vector (DSDV) 42 xii

2.6 Global Connectivity for IPv6 MANET 44 2.6.1 Mobile IPv6 (MIPv6) 47 2.6.2 Internet Connectivity for Ad hoc Mobile Networks 50 2.6.3 Integrating Mobile IP with Ad Hoc Networking 51 2.6.4 Architecture for connecting Ad hoc Networks with the IPv6 Backbone (6Bone) Using a Wireless Gateway. 52 2.7 Existing Work Global Connectivity and Wireless Hybrid Network issues. 53 2.7.1 MIPMANET-Mobile IP for Mobile Ad Hoc Networks 53 2.7.2 Gateway Forwarding Strategies for Ad hoc Networks 54 2.7.3 Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks. 57 2.7.4 Hybrid gateway advertisement scheme for connecting Mobile Ad Hoc networks to the Internet. 58 2.8 Comparison AODV, DSR, DSDV 60 2.9 Conclusion 61 3 METHODOLOGY 64 3.1 Introduction 64 3.2 Network Simulator Tool Version (NS2) 64 3.2.1 The system flow of NS2 64 3.2.2 The system flow chart 65 3.3 AODV Extended Route Request (RREQ) 67 3.4 AODV Extended Route Reply (RREP-I) 68 3.5 Obtaining a Default Route 69 3.6 Proposed Solution for Unreachable Gateway 70 3.7 The Support Internet Connectivity 71 3.8 Solution to Support Internet connectivity AODV 74 3.8.1 Auto-configuration of Global Addresses 75 3.8.2 Forwarding Algorithms in Intermediate Nodes 76 3.8.3 Route Determination Algorithm in Sender Nodes 78 3.9 Implementation Internet Gateway approaches 83 3.9.1 Internet Proactive Gateway Approaches 84 3.9.2 Internet Reactive Gateway approaches 86 3.9.3 Internet Hybrid Gateway Approaches 87 3.10 Simulation Scenario 88 3.10.1 Simulation for performance testing (50 Nodes) 88 3.10.2 Simulation setup fro Internet Connectivity (15node) 89 3.10.3 Simulation setup fro Internet Connectivity (50 node) 90 3.11 Conclusion 92 4 RESULTS AND DISCUSSION 94 4.1 Evaluating Comparative performance 94 4.1.1 Ad Hoc on Demand Distance Vector (AODV) 95 4.1.2 Dynamic Source Routing (DSR) 97 4.1.3 Destination Sequenced Distance Vector (DSDV) 98 4.2 Simulation Scenario for 50 mobile nodes 100 4.2.1 Results 101 xiii

4.3 Simulation Environment from Internet Connectivity (15 nodes) 112 4.3.1 Parameter simulation scenario for Internet Connectivity (15 nodes) 114 4.3.2 Average end-to-end Delay 115 4.3.3 Packet delivery ratio 116 4.3.4 AODV overhead 118 4.4 Simulation Environment from Internet Connectivity (50 nodes) 120 4.4.1 Parameter simulation scenario for Internet Connectivity (50 nodes) 121 4.4.2 Results and Discussion of Internet connectivity 121 4.5 Conclusion 132 5 CONCLUSION 134 5.1 Summary 134 5.2 Future work 136 REFERENCES 138 BIODATA OF THE AUTHOR 143 xiv

LIST OF TABLES Table Page 4.1 Parameter used in the AODV implementation 96 4.2 Parameter used in the DSR implementation 97 4.3 Parameter used in the DSDV implementation. 98 4.4 Parameter used for offered load simulations (50 Nodes) 99 4.5 General parameter used in all simulation, Scenario Internet Connectivity (15 Nodes) 114 4.6 General parameter used in all simulation, Scenario Internet Connectivity (50 Nodes) 120 xv

Figure LIST OF FIGURES Page 1.2 The OSI model, TCP/IP suite and MANET protocol stack 11 1.3 The protocol stacks used by mobile nodes gate and Internet nodes 12 2.1 Example of a simple ad-hoc network with three participating nodes. 20 2.2 Block Diagram of mobile node acting both as host and as router. 21 2.3 Example of an ad- hoc Network: Airport Scenario 23 2.4 Hierarchical Graph for Classification of Ad hoc routing protocols 29 2.5 Reverse route setup with source node A and destination E. 38 2.6 Forward route setup between source node A and destination node E. 39 2.7 If the mobile host moves to network B without changing its IP address, all the packets destined to it will continue to be routed to network A 48 2.8 The usage of tunneling to gateways. 56 3.1 System Flow chart 66 3.2 The format of a route request message extended with the I-flag. (RREQ-I) 68 3.2 The format of a route reply message extended with the I- flag. (RREP-I) 70 3.4 Sending packets with routing header 74 3.5 Flowchart forwarding algorithm in Intermediate nodes 79 3.6 Flowchart Proposed Route determination algorithm 84 3.7 The format of a Gateway Advertisement message 87 4.1 Screenshot of the simulation scenario 101 4.2 AODV Received Packets against Mobility 103 4.3 DSR Received Packets against Mobility 103 4.4 DSDV Received Packets against Mobility 104 4.5 AODV- Average packet delay against host Mobility for Various Offered load. 106 xvi

4.6 DSR- Average packet delay against host Mobility for Various Offered load. 106 4.7 DSDV- Average packet delay against host Mobility for Various Offered load. 107 4.8 AODV- Average Throughput delay against host Mobility for various Offered load. 108 4.9 DSR- Average Throughput delay against host Mobility for various Offered load. 109 4.10 DSDV- Average Throughput delay against host Mobility for various Offered load. 109 4.11 AODV- Offered load simulation overhead 111 4.12 DSR: Offered load simulation overhead 111 4.13 DSDV: Offered load simulation- overhead 112 4.14 Screenshot of the simulation scenario 113 4.15 Screenshots of the simulation scenario with traffic congestion 114 4.16 Average End to end Delay against advertisement intervals 116 4.17 Packet delivery Ratio against advertisement intervals 117 4.18 AODV packet Transmission packets against advertisement intervals 120 4. 19 Screenshot of the simulation scenario with traffic congestion 122 4.20 Screenshot of the simulation scenario with traffic congestion went packet drops. 123 4.21 The impact of advertisement interval. 124 4.22 Impact of advertisement interval after implementing algorithm 125 4.23 The Packet Delivery Ratio against Traffic Load for 50 nodes 126 4.24 Average end-to-end against Traffic Load for 50 nodes 127 4.25 Average end-to-end delay against Traffic Load for 50 nodes with route discovery protocol 129 4.26 AODV Overhead against Traffic Load 131 xvii

4.27 AODV Overhead against Traffic Load after implementing the forwarding algorithm. 131 xviii

LIST OF ABBREVIATIONS AODV CBR DSR DSDV TORA TCP ICMP IP LLC MAC NS OTcl PDA FSR OLSR OSI NAM ZRP MANET UDP IEEE LMR WRP DAG Ad hoc On Demand Distance Vector Constant Bit Rate Dynamic Source Routing Destination Sequenced Distance vector Temporally Ordered Routing Algorithm Transmission Control Protocol Internet Control Message Protocol Internet Protocol Logical Link Layer Medium Access Control Network Simulator Object Tool Command language Personal Digital Assistant Fish Sources Routing Optimized Link State Routing Protocol Open System Interconnection Network Animator Zone Routing Protocol Mobile Ad hoc Network User Data gram Protocol Institute of Electrical and Electronics Engineer Lightweight Mobile Routing Wireless Routing Protocol Directed Acyclic Graph xix

CGSR ABR BQ RREP RREQ TTL IEFT GWADV IPv6 GSM DARPA TCL WG Cluster head Gateway switch Routing Associatively Based Routing Broadcast Query Route REPLY Route REQUEST Time to Live Internet Engineering Task Force Gateway Advertisement Internet Protocol version Global System for Mobile Communication Defense Advanced Research Project Agency Tool Command Language Work Group xx

CHAPTER 1 INTRODUCTION In the coming years, information technology will be mainly based on wireless technology. Future wireless is totally multidimensional; also wireless mobile and access will be converged to be more ad hoc and reconfigurable. Ad hoc will be one of the next storms in the wireless communications, large area mobile multihop wireless and personal access networks. A mobile ad hoc network is an autonomous system of mobile routers (and associated hosts) connected by wireless links.the routers and hosts are free to move randomly and organized arbitrarily, thus the networks wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion or be connected to the larger Internet. Since their emergence in 1970 s, wireless networks have become increasingly popular in the computing industry. These networks provide mobile users with ubiquitous computing capability and information access regardless of the location. There are currently two variations of mobile wireless networks-infra-structured and infrastructure less networks. The infra-structured networks, also known as cellular network, have fixed and wired gateways. They have fixed base stations that are connected to other base stations through wires. The transmission range of a base station constitutes a cell. All the mobile nodes lying within this cell connect to and communicate with the nearest bridge (Base station). A hand off occurs as mobile host travels out of range of one base station and into the range of another

and thus, mobile host is able continue communication seamlessly throughout the network. The other type of network, infrastructure less network, is known as Mobile Ad network (MANET). These networks have no fixed routers. All nodes are capable of movement and can be connected dynamically in arbitrary manner. The responsibilities for organizing and controlling the network are distributed among the terminals themselves. The entire network is mobile, and the individual terminals are allowed to move at will relative to each other. In this type of network, some pairs of terminal may not be able to communicate directly to with each other and relaying of some messages is required so that they are delivered to their destinations. With recent performance advancements in computer and wireless communications technologies, advanced mobile wireless computing is expected to see increasingly widespread use and application, much of which will involve the use of the Internet Protocol (IP) suite. The vision of mobile ad hoc networking is to support robust and efficient operation in mobile wireless networks by incorporating routing functionality into mobile nodes. Such networks are envisioned to have dynamic, sometimes rapidly changing, random, multi-hop topologies, which are likely composed of relatively bandwidth-constrained wireless links. Within the Internet community, routing support for mobile hosts is presently being formulated as "mobile IP" technology. This is a technology to support nomadic host "roaming", where a roaming host may be connected through various 2

means to the Internet other than its well-known fixed-address domain space. The host may be directly connected to the fixed network on a foreign subnet, or be connected via a wireless link, dial-up line, etc. Supporting this form of host mobility requires address management, protocol interoperability enhancements and the like, but core network functions such as hop-by-hop routing still presently rely upon pre-existing routing protocols operating within the fixed network. In contrast the goal of mobile ad hoc networking is to extend mobility into the realm of autonomous, mobile, wireless domains, where a set of nodes, which may be, combined routers and hosts themselves form the network routing infrastructure in an ad hoc fashion. Mobile ad hoc networking allows users to exchange information in a wireless environment without the need for a fixed infrastructure. Each user (or node), equipped with one or more radios, is free to roam about while communicating with others. The path between any pair of users can traverse multiple wireless links and the radios themselves can be heterogeneous, thus enabling an assortment of different types of links to be part of the same ad hoc network. The mobility of the nodes results in a network whose topology is dynamic. The of the network is to discover the links between the mobile nodes and to build paths so that any user can communicate with any other user, as long as each has a link to the ad hoc network. Within the ad hoc network, each node acts as a router and forwards packets on behalf of others, some sort of routing protocol is necessary to make the routing decisions. 3

1.1 Mobile Ad hoc Networks (MANET) A mobile ad hoc network is a collection of mobile nodes that cooperatively and spontaneously form a wireless network without the use of any fixed infrastructure (e.g., base stations or access points), or centralized administration. The system may operate in isolation, or may have gateways connected with a fixed network. In the latter mode, it is typically envisioned as a sub network connected to a fixed network. The mobile devices used in ad hoc networks could include an evolution of current cell phones, PDA, or laptops equipped with wireless interfaces. In a MANET, each mobile node is equipped with a wireless transmitter and receiver using antennas. Nodes can communicate directly with other nodes within its wireless transmission range. However, wireless links have significantly lower capacity and transmission range than their hardwired counterparts due to effects, such as signal fading, noise and limited battery power. Consequently, multiple hops may be needed for one node to exchange data with another across the network. Thus, each node must be capable of acting as a host and as a router. Packet forwarding, routing and other network operations are distributed and carried out by individual nodes. In general, mobile nodes in ad hoc networks are free to move randomly and organize themselves arbitrarily. The network topology may change with time as the nodes move or adjust their transmission or power, so it can change rapidly and unpredictably. 1.2 MANET Internet Engineering Task Force 4